Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
CrackLauncher.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CrackLauncher.exe
Resource
win10v2004-20250217-en
General
-
Target
CrackLauncher.exe
-
Size
76KB
-
MD5
eaf8bead81874b59ed1e17761dcda97a
-
SHA1
c449a6daae2900b66d8490b29793974ccc42adaa
-
SHA256
b09cb3790f8d27dedc636d2bb8532a94fddaf88a9428e17be30b31a3b742b2f2
-
SHA512
cdeda053b0fb2e526c943acb95696b5c9e577ea50a7871a5aa30830dc9fd25ede7d826139096c9669a193bbd3dfa0e5b72857c5857f0c1725d91a19184f60be9
-
SSDEEP
1536:UQFZgCR8ZPMhcNi1ptY8353R6L5ph64yJ3We9Gq:bLRbPR6L5ph6JJ3We99
Malware Config
Extracted
xworm
5.0
ideas-equation.gl.at.ply.gg:13038
Sdytd3eRdcISYTKJ
-
Install_directory
%AppData%
-
install_file
dawas.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x00030000000227b4-26.dat family_xworm behavioral2/memory/1780-34-0x0000000000110000-0x0000000000122000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4708 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation CrackLauncher.exe -
Executes dropped EXE 1 IoCs
pid Process 1780 NurikCrack1.16.5.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NurikCrack1.16.5 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NurikCrack1.16.5.exe" CrackLauncher.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 36 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4708 powershell.exe 4708 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4708 powershell.exe Token: SeDebugPrivilege 1780 NurikCrack1.16.5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1400 wrote to memory of 4468 1400 CrackLauncher.exe 90 PID 1400 wrote to memory of 4468 1400 CrackLauncher.exe 90 PID 1400 wrote to memory of 4708 1400 CrackLauncher.exe 91 PID 1400 wrote to memory of 4708 1400 CrackLauncher.exe 91 PID 1400 wrote to memory of 1780 1400 CrackLauncher.exe 96 PID 1400 wrote to memory of 1780 1400 CrackLauncher.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\CrackLauncher.exe"C:\Users\Admin\AppData\Local\Temp\CrackLauncher.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\CrackLauncher.exe"C:\Users\Admin\AppData\Local\Temp\CrackLauncher.exe"2⤵PID:4468
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\NurikCrack1.16.5.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4708
-
-
C:\Users\Admin\AppData\Local\Temp\NurikCrack1.16.5.exe"C:\Users\Admin\AppData\Local\Temp\NurikCrack1.16.5.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
Filesize
44KB
MD5b738126406c02253ee779ac205d9174e
SHA170dc9f77f20777184df051201ab4eb6ae23fdd58
SHA256b3d74f6ae903c8e60a8bc30315e3cbb5734577c3297ee3df2cd619b16d5884e3
SHA512c26dac50200e66a9810817ac6a6b56c9a82b5ddb58a018681d7ff486ec0dccb5867349915d583ed9725a793fd707e5e1f5a2b01a2f3d9909e11207747373bfa9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82